The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-6185.json"